Publications

Process and System for Establishing a Moving Target Connection for Secure Communications in Client/Server Systems

Morrell, C; Moore, R; Tront, J; Marchany, R;

USMA Digital Commons

March 26, 2019;

Abstract: HTML Full Text: PDF

Rights and Permissions


Speed isn’t Enough: Usability and Adoption of an Optimized Alert Notification System

Zeitz, K.; Marchany, R; Tront, J

IEEE Technology and Society Magazine

2016 Mar; 35(1):47-55.


Strengthening MT6D defenses with honeypot capabilities

Basam, D.; Ransbottom, J.; Marchany, R.; Tront, J.

Journal of Electrical and Computer Engineering [Special Issue: System and Network Security]

2015, Pending.


Attention: moving target defense networks, how well are you moving?

Basam, D.; Marchany, R.; Tront, J.

Proceedings of the 12th ACM International Conference on Computing Frontier (CF'15)

2015, To Appear.


Utilizing the BitTorrent DHT for Blind Rendezvous and Information Exchange

Moore, R.; Morrell, C.; Marchany, R.; Tront, J.

Cyber Security and Trusted Computing (Milcom 2015 Track 3)

2015, To Appear.


DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses

Morrell, C.; Moore, R.; Marchany, R.; Tront, J.

Second ACM Workshop on Moving Target Defense at the ACM Conference on Computer and Communications Security (CCS)

2015; pp.77-84


Scaling IPv6 Address Bindings in Support of a Moving Target Defense

Morrell, C.; Ransbottom, J.S.; Marchany, R.; Tront, J.

International Conference for Internet Technology and Secured Transactions (ICITST)

Dec 8-10, 2014; pp.440-445


Implementing dynamic address changes in ContikiOS

Preiss, T.; Sherburne, M.; Marchany, R.; Tront, J.

In Information Society (i-Society '14)

Nov 10, 2014


Implementing moving target IPv6 defense to secure 6LoWPAN in the Internet of Things and Smart Grid

Sherburne, M.; Marchany, R; & Tront, J.

Cyber and Information Security Research Conference (CISR '14)

April 8, 2014


Poster: A comparative study of metaphors for investigating augmented reality artifacts

Zeitz, K.; Zeitz, R.; Tao, C.; Polys, N.

Proceedings of the IEEE Symposium on 3D User Interfaces (3DUI '14)

March 29, 2014


Designing an Optimized Alert System Based on Geospatial Location Data

Zeitz, K.; Marchany, R.; & Tront, J.

Hawaii International Conference on System Sciences (HICSS '14)

January 6, 2014


Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense

Groat, S., Moore, R., Marchany, R., & Tront, J.

International Workshop on the Engineering of Mobile-Enabled Systems - MOBS '13

May 25, 2013

Full Text: PDF Slides: PDF

Rights and Permissions


Universal framework for unmanned system penetration testing

Kobezak, P.; Abbot-McCune, S.; Tront, J.; Marchany, R.; & Wicks, A.

Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing

May 17, 2013


UGV: security analysis of subsystem control network

Abbot-McCune, S.; Kobezak, P.; Tront, J.; Marchany, R.; & Wicks, A.

Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing

May 17, 2013


Using transport layer multihoming to enhance network layer moving target defenses

Moore, R., Groat, S., Marchany, R., & Tront, J.

Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13)

January 08, 2013


Dynamic Analysis of Large Datasets with Animated and Correlated Views

Cao, Y., Moore, R., Mi, P., Endert, A., North, C., & Marchany, R.

Visual Analytics Science and Technology (VAST)

October 14, 2012


An Evaluation of IPv6 in Simulation using OPNET Modeler

Clore, B.; Dunlop, M.; Marchany, R.; Tront, J.

Eighth Advanced International Conference on Telecommunications (AICT 2012)

May 27 - June 1, 2012

AbstractPlus | Full Text: PDF IARIA CNF

Rights and Permissions


Leveraging Cognitive Principles to Improve Security Visualization

Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.

Fourth International Conference on Networked Digital Technologies (NDT'2012)

April 24-26, 2012

AbstractPlus | Full Text: PDF Springer LNCS CNF

Rights and Permissions


The Blind Man’s Bluff Approach to Security Using IPv6

Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, M.; Tront, J.

Security & Privacy, IEEE

TBP 2012; Volume: PP, Issue: 99, Page(s): 1-1

AbstractPlus | Full Text: PDF IEEE JNL

Rights and Permissions


Using an IPv6 Moving Target Defense to Protect the Smart Grid

Groat, S.; Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.

2012 IEEE PES Innovative Smart Grid Technologies Conference

January 16-19, 2012

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


MT6D: a Moving Target IPv6 Defense

Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, R.; Tront, J.

2011 Military Communications Conference (MILCOM)

November 7-10, 2011

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


Security and Privacy produced by DHCP Unique Identifiers

Tront, J.; Groat, S.; Dunlop, M.; Marchany, R.

16th North-East Asia Symposium on Nano, Information Technology and Reliability

October 24-26, 2011

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


IPv6 Dynamic Network Addressing and Its Impact on Network Forensic Investigations

Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.

Journal of Network Forensics

Autumn 2011; Volume: 3, Issue: 1, Page(s): 6-18

AbstractPlus | Full Text: PDF SECAU JNL

Rights and Permissions


Cover-VT: Converged Security Visualization Tool

Urbanski, W.; Dunlop, M.; Marchany, R.; Tront, J.

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)

May 23-27, 2011

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


The Good, the Bad, the IPv6

Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.

Ninth Annual Conference on Communication Networks and Services Research (CNSR 2011)

May 2-5, 2011

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


Using Dynamic Addressing for a Moving Target Defense

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.

6th International Conference on Information Warfare and Security (ICIW 2011)

March 17-18, 2011

Proceedings, p. 84


What DHCPv6 Says About You

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.

World Congress on Internet Security (WorldCIS-2011)

February 21-23, 2011

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


IPv6: Now You See Me, Now You Don’t

Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.

Tenth International Conference on Networks (ICN 2011)

January 23-28, 2011

AbstractPlus | Full Text: PDF IARIA CNF

Rights and Permissions


IPv6: Nowhere to Run, Nowhere to Hide

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.

44th Hawaii International Conference on Systems Science (HICSS-44 2011)

January 4-7, 2011

AbstractPlus | Full Text: PDF IEEE CNF

Rights and Permissions


Using Geographic Information Systems for Enhanced Network Security Visualization

Shelly, D.; Dunlop, M.; Marchany, R.; Tront, J.

1st International Conference on Computing for Geospatial Research & Application (COM.Geo 2010)

June 21-23, 2010


GoldPhish: Using Images for Content-Based Phishing Analysis

Dunlop, M.; Groat, S.; Shelly, D.

5th International Conference on Internet Monitoring and Protection (ICIMP 2010)

May 9-15, 2010; Page(s):123-128

Digital Object Identifier 10.1109/ICIMP.2010.24

AbstractPlus | Full Text: PDF(674 KB) IEEE CNF

Rights and Permissions


The Privacy Implications of Stateless IPv6 Addressing

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.

6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010)

April 21-23, 2010


Taming the Blue Beast: A Survey of Bluetooth Based Threats

Dunning, J.P.

Security & Privacy, IEEE

March-April 2010; Volume: 8, Issue: 2, Page(s):20-27

Digital Object Identifier: 10.1109/MSP.2010.3

AbstractPlus | Full Text: PDF(2966 KB) IEEE JNL

Rights and Permissions


Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices

Moyers, B.R.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.

System Sciences (HICSS), 2010 43rd Hawaii International Conference on

January 5-8, 2010; Page(s):1-9

Digital Object Identifier: 10.1109/HICSS.2010.170

AbstractPlus | Full Text: PDF(757 KB) IEEE CNF

Rights and Permissions


Validation of the Battery-Sensing Intrusion Protection System Through Enhanced Wi-Fi and Bluetooth Attack Correlation

Moyers, B.R.; Dunning, J.P.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.

70th IEEE International Conference on Portable Information Devices (Portable 2009)

September 20-23, 2009; Page(s):1-5

Digital Object Identifier: 10.1109/VETECF.2009.5378889

AbstractPlus | Full Text: PDF(1238 KB) IEEE CNF

Rights and Permissions


Simulating the Deployment of Battery-Sensing Intrusion Protection Systems

Nelson, T.M.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.

System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on

January 5-8, 2009; Page(s):1-9

Digital Object Identifier: 10.1109/HICSS.2009.394

AbstractPlus | Full Text: PDF(300 KB) IEEE CNF

Rights and Permissions


Battery-Sensing Intrusion Protection System (B-SIPS)

Buennemeyer, T.K.

Doctoral Dissertation, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University

December 5, 2008

Full Text: PDF(6 MB)


Mobile Device Profiling and Intrusion Detection using Smart Batteries

Buennemeyer, T.K.; Nelson, T.M.; Clagett, L.M.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.

System Sciences, Hawaii International Conference on System Sciences, Proceedings of the 41st Annual

January 7-10, 2008; Page(s):296

Digital Object Identifier: 10.1109/HICSS.2008.319

AbstractPlus | Full Text: PDF(754 KB) IEEE CNF

Rights and Permissions


Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices

Buennemeyer, T.K.; Nelson, T.M.; Gora, M.A.; Marchany, R.C.; Tront, J.G.

Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC

June 20-22, 2007; Page(s):135-142

Digital Object Identifier : 10.1109/IAW.2007.381925

AbstractPlus | Full Text: PDF(11203 KB) IEEE CNF

Rights and Permissions


Battery Exhaustion Attack Detection with Small Handheld Mobile Computers

Buennemeyer, T.K.; Gora, M.; Marchany, R.C.; Tront, J.G.

Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on

May 25-29, 2007; Page(s):1-5

Digital Object Identifier : 10.1109/PORTABLE.2007.35

AbstractPlus | Full Text: PDF(452 KB) IEEE CNF

Rights and Permissions


Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems

Buennemeyer, T.K.; Nelson, T.M.; Marchany, R.C.; Tront, J.G.;

SoutheastCon, 2007. IEEE

March 2007 Page(s):740 - 745

Digital Object Identifier 10.1109/SECON.2007.342999

AbstractPlus | Full Text: PDF(299 KB) IEEE CNF

Rights and Permissions


Internet Security: Intrusion Detection and Prevention in Mobile Systems

Tront, J.G.; Marchany, R.C.;

System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on

Jan. 2007 Page(s):162 - 162

Digital Object Identifier 10.1109/HICSS.2007.287

AbstractPlus | Full Text: PDF(121 KB) IEEE CNF

Rights and Permissions


Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection

Buennemeyer, T.K.; Munshi, F.; Marchany, R.C.; Tront, J.G.;

System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on

Jan. 2007 Page(s):163b - 163b

Digital Object Identifier 10.1109/HICSS.2007.103

AbstractPlus | Full Text: PDF(408 KB) IEEE CNF

Rights and Permissions


Using Battery Constraints within Mobile Hosts to Improve Network Security

Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;

Security & Privacy Magazine, IEEE

Volume 4, Issue 5, Sept.-Oct. 2006 Page(s):40 - 49

Digital Object Identifier 10.1109/MSP.2006.139

AbstractPlus | Full Text: PDF(1707 KB) IEEE JNL

Rights and Permissions


Ubiquitous Security: Privacy versus Protection

Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.

2006 International Conference on Pervasive Systems and Computing (PSC 2006)

June 26-29, 2006; Page(s):71-77

Full Text: PDF(162 KB)

Rights and Permissions


Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols

Raymond, D.; Marchany, R.; Brownfield, M.; Midkiff, S.;

2006 IEEE Information Assurance Workshop

June 21-23,2006; Page(s):297 - 304

AbstractPlus | Full Text: PDF(304 KB) IEEE CNF

Rights and Permissions


Battery-Sensing Intrusion Protection System

Buennemeyer, T.K.; Jacoby, G.A.; Chiang, W.G.; Marchany, R.C.; Tront, J.G.;

2006 IEEE Information Assurance Workshop

June 21-23 Page(s):176 - 183

AbstractPlus | Full Text: PDF(822 KB) IEEE CNF

Rights and Permissions


Cross-layer wireless sensor network radio power management

Brownfield, M.I.; Fayez, A.S.; Nelson, T.M.; Davis, N., IV;

Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE

Volume 2, April 3-6, 2006; Page(s):1160 - 1165

AbstractPlus | Full Text: PDF(298 KB) IEEE CNF

Rights and Permissions


Wireless sensor network energy-adaptive mac protocol

Brownfield, M.I.; Mehrjoo, K.; Fayez, A.S.; Davis, N.J., IV;

Consumer Communications and Networking Conference, 2006. CCNC 2006. 2006 3rd IEEE

Volume 2, January 8-10, 2006; Page(s):778 - 782

AbstractPlus | Full Text: PDF(374 KB) IEEE CNF

Rights and Permissions


Symbiotic highway sensor network

Brownfield, M.I.; Davis, N.J.;

Vehicular Technology Conference, 2005. VTC-2005-Fall. 2005 IEEE 62nd

Volume 4, 25-28 Sept., 2005 Page(s):2701 - 2705

Digital Object Identifier 10.1109/VETECF.2005.1559039

AbstractPlus | Full Text: PDF(281 KB) IEEE CNF

Rights and Permissions


Wireless sensor network denial of sleep attack

Brownfield, M.; Yatharth Gupta; Davis, N.;

Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. Proceedings from the Sixth Annual IEEE

15-17 June 2005 Page(s):356 - 364

Digital Object Identifier 10.1109/IAW.2005.1495974

AbstractPlus | Full Text: PDF(529 KB) IEEE CNF

Rights and Permissions


Chained puzzles: a novel framework for IP-layer client puzzles

McNevin, T.J.; Jung-Min Park; Marchany, R.;

Wireless Networks, Communications and Mobile Computing, 2005 International Conference on

Volume 1, 13-16 June 2005 Page(s):298 - 303 vol.1

Digital Object Identifier 10.1109/WIRLES.2005.1549426

AbstractPlus | Full Text: PDF(1952 KB) IEEE CNF

Rights and Permissions


Battery-based intrusion detection a first line of defense

Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;

Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC

10-11 June 2004 Page(s):272 - 279

Digital Object Identifier 10.1109/IAW.2004.1437827

AbstractPlus | Full Text: PDF(1247 KB) IEEE CNF

Rights and Permissions


Reflections on operating in hostile environments

Bazaz, A.; Arthur, J.D.; Marchany, R.;

System Sciences, 2004. Proceedings of the 37th Annual Hawaii

International Conference on

5-8 Jan. 2004 Page(s):10 pp.

Digital Object Identifier 10.1109/HICSS.2004.1265454

AbstractPlus | Full Text: PDF(258 KB) IEEE CNF

Rights and Permissions


Internet Security: Intrusion Detection & Prevention

Tront, J.G.; Marchany, R.C.;

System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on

5-8 Jan. 2004 Page(s):1 pp.

Digital Object Identifier 10.1109/HICSS.2004.1265449

AbstractPlus | Full Text: PDF(163 KB) IEEE CNF

Rights and Permissions


Introduction to internet security

Tront, J.G.; Marchany, R.C.;

System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on

6-9 Jan 2003 Page(s):203 - 203

Digital Object Identifier 10.1109/HICSS.2003.1174460

Abstract | Full Text: PDF(226 KB) IEEE CNF

Rights and Permissions


CANDI: a system for classifying the security risks in appliances

Tront, J.G.; Marchany, R.C.;

System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on

6-9 Jan 2003 Page(s):5 pp.

Digital Object Identifier 10.1109/HICSS.2003.1174461

Abstract | Full Text: PDF(1012 KB) IEEE CNF

Rights and Permissions


Introduction to the internet security minitrack

Marchany, R.C.; Tront, J.G.;

System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on

7-10 Jan 2002 Page(s):2491 - 2491

Abstract | Full Text: PDF(225 KB) IEEE CNF

Rights and Permissions


E-commerce security issues

Marchany, R.C.; Tront, J.G.;

System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on

7-10 Jan 2002 Page(s):2500 - 2508

Abstract | Full Text: PDF(464 KB) IEEE CNF

Rights and Permissions